2012年2月10日星期五

Protect Your Server with a Dedicated Cisco firewall


cisco asa 5520 prices are available for networks of all sizes, including yours.

Enhance Your Data Center Switches
Add firewall capabilities with the Cisco Catalyst 6500 Series ASA Services Module.

Firewall for Branch Routers
Get integrated security for the ISR for branch, small and midsize businesses, and managed services

Protect your server with a dedicated firewall asa 5520. Gigenet utilizes Cisco's firewall services module (FWSM) to provide instant firewall activation and simple management through a secure web interface.

High Performance, High Scalability,
Low Latency
  • Gbps throughput per module
  • 100,000 connections per second
  • 1,000,000 concurrent connections
  • Single port or VLAN spanning
     
Best-In Class Features
  • Time-tested Cisco PIX operating system
  • PIX Device Manager GUI
  • Transparent Layer(2) Firewalls
  • Rich stateful inspection for web, VOIP
    and multimedia

The Cisco firewall services module is designed to recognize and filter the following types of traffic:
  • Core services: HTTP, FTP, ESMTP, DNS, ICMP, TCP, UDP
  • Voice over IP (VoIP) / Unified Communication services: SIP, SCCP, H.323, RTSP, TAPI/JTAP, GTP
  • Application/operating system services: cisco asa 5520 price LDAP/ILS, SunRPC, XDMCP, TFTP

More about Cisco ASA 5500 Series Adaptive Security Appliances
ASA Models
There are six main models in the ASA range, from the basic 5505 branch office model up to the 5580 datacenter versions; a full comparison is available on the Cisco website here: Cisco ASA 5500 Series Adaptive Security Appliances
Although this article will concentrate on the 5505 and 5510 models the basic feature set is in fact fairly consistent across the range, the main differences being in the maximum traffic throughput handled by each model and the number/type of interfaces.

At the most basic level the ASA is a transparent or routed firewall/NAT device, this means it is designed to sit between your LAN and the Internet; one interface (normally known as "outside") will be connected to your Internet access device and one or more interfaces (e.g. "inside" and "DMZ") will connect to your internal networks. This enables the ASA to inspect and control all traffic passing between your network and the Internet, exactly what it does with that traffic is the clever bit.

ASA 5510
The ASA5510 is intended to be a single device solution to your Internet security requirements and with its 300Mbps throughput and 9,000 firewall connections per second capacity will be suitable for most office deployments. The key features will be covered in more detail later but in brief these are; firewall/NAT, SSL/IPsec VPN, content security and intrusion prevention. It has five 10/100Mbps ports, by default these provide one outside (Internet) interface, one management and three internal network interfaces but they are fully reconfigurable and also support vLANing for further network subdivision if required. Functionality can be upgraded via a Security Services Module port which provides support for additional Content Security and Intrusion Prevention features.

ASA 5505
The ASA5505 is intended for small or branch office and teleworker deployments, often in conjunction with a 5510 or higher model at the head office to which it will establish a secure VPN, whilst providing full security for other Internet traffic. The device has 8 10/100Mbps Ethernet ports, including 2 with Power over Ethernet support suitable for PoE devices such as IP phones or cameras, so it can be used as single unit solution for the smaller office. Key differences compared to the 5510 are the reduced support for VPN connections (only 10 but upgradeable to 25 with license), only 3 vLANs (25 with Security Plus license)  and only a slot for the optional Security Services Card so there is no option for the advanced Content Security services.

Key Features
Firewall
All ASA models include a fully featured policy based firewall and routing engine which allows you complete control of which traffic you allow in and out of your network. Layer 2/3 firewalling allows you to specify which hosts are allowed access through the ASA and also to perform Network Address Translation to map internal hosts to public IP addresses. Layer 7 firewall goes several steps further and also allows you to define access policies based on application and protocol type, providing extremely granular control over Internet access and protection against advanced types of network attack. Unlike many competitor's firewalls the ASA's policy and interface based approach to access control gives you complete control over traffic leaving your network as well as incoming, for example allowing you to restrict Instant Messaging use to only your approved client application. Deep packet inspection goes beyond simply analysing the protocol and port of the attempted connection to discover the application behind it making it virtually impossible for users to circumvent company IT policies.

SSL & IPsec VPN
Even the cisco ASA 5505 includes full support for IPsec and SSL VPN endpoints, providing highly encrypted tunnels for office to office and remote user to office connections. The basic license for all ASAs allows IPsec VPN connections up to the maximum supported on each model but only includes two SSL VPN licenses, to allow for testing before deployment. The 5505 will support up to 25 simultaneous VPN connections, whilst the 5510 supports a maximum of 250 - these can be any combination of IPsec or SSL, and site to site or remote client types.


IPsec VPNs are commonly deployed between Cisco VPN devices for site to site connections, or initiated by client software on the remote worker's computer. Included with all ASA license bundles is the Cisco AnyConnect VPN client, with versions available for all major operating systems; Windows 2000 up to Windows 7, Mac OS X (10.4/5), Linux Intel kernel 2.6.x and even Windows Mobile 5.0/6.0/6.1 . Cisco AnyConnect provides several improvements over the basic IPsec functionality built into those operating systems, key features are:
  • DTLS protocol support to help minimize latency for applications such as VoIP
  • Support for SSL tunneling to ensure connectivity even through restrictive proxies and firewalls (if web browsing is possible then so is a VPN connection)
  • Advanced encryption and wide range of authentication protocols, including two factor smartcard/token based
  • Flexible IP tunneling for consistent user experience with features such as connection retention, ensuring the mobile user retains connectivity through disconnections, reboots and standby/hibernation.

Tips:
Cisco ASA Firewalls: 5505, 5510, 5520, 5540, 5580, the full Cisco PIX Firewall family, FWSM, CSM, Cisco VPN Routers etc.
Cisco VPN: VPN 3000 Series Concentrators, VPN blades, Site-to-Site VPN, Remote Access VPN, Cisco SSL VPN etc.
Cisco IPS: 4200 series, IDSM-2 blade, Cisco IOS IPS, Shunning, IPS Manager, IDM, AIP-SSM, HIPS (CSA) etc.
Cisco MARS: MARS 20, MARS 50, MARS 100, integration with IPS and CSA, reports, queries, local / global set ups etc.
Identity Management:Cisco ACS, RADIUS, TACACS+, 802.1x, LDAP, OTP, RSA, certificates, biometrics etc.
Router & Switch Security: Access-Lists, VLAN maps, TCP Intercept, Lock-and-Key, Anti Spoofing, CBAC, IOS Firewall etc.
Network Admission Control (NAC): In-band, out-of-band, clean access client, ACS integration, 3rd. party integration etc.

2012年1月16日星期一

How to Set Passwords on Cisco Routers


Having a password on your CISCO router is the difference between casually browsing the Internet and losing your entire data and network infrastructure. There are two primary passwords that need to be set; the enable password, and the enable secret password. Without these passwords, anyone accessing the router CISCO881G-S-K9 is able make any configuration changes they want, to include shutting you out of your own network. In less than two minutes, setting your passwords puts you on your way to a more secure router and network infrastructure.

What youneed as follows:
CISCO router
Ethernet cable or console cable

How to Set the Passwords on a CISCO Router?
1.Connect your computer to the CISCO router by using either a console cable or an Ethernet cable. If using the console cable, connect it to the console port on your computer, then to the console port on the CISCO router which will be labeled "Console," (CISCO 2600 Series Cabling and Setup) in blue writing. If using an Ethernet cable, first connect it to your computer's Local Area Network (LAN) port, usually located on the side of a laptop, or the rear of a desktop computer, then to the Ethernet port labeled "ETHERNET 0/0" (CISCO 2600 Series Cabling and Setup) on the CISCO router.

2. Use the console port to access the router CISCO881W-GN-A-K9 via the Hyper Terminal program that comes preinstalled with the Windows operating system.

Go to the Start menu and select "All Programs" >"Accessories">"Communications." Click on the shortcut to Hyper Terminal. Use the following port settings when asked by Hyper Terminal:
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None

Alternately, open a command prompt window by going to your Start menu and selecting "Run." Then enter "cmd," and press "Enter." In the command prompt, enter the command "telnet" followed by the IP address of the router.

The command line looks like this: C:\telnet 123.156.204.12

3.Enter the privileged mode of the router before attempting any changes. Use the following command. Note that the "Router>" is the default router prompt for a CISCO router.

Router>enable

Entering the enable command will change your CISCO router prompt to:

Router#

4. Use the following command to enter the configuration mode of the cisco 1800  router:

Router#config t

Successfully entering the configuration mode will give you the following message: "Enter configuration commands, one per line. End with CNTL/Z."

Entering the configuration mode of the CISCO router will give you the following prompt:

Router(config)#

5.Set the enable password by using the command "enable password". For example, use the password "Changeme2".

Router(config)#enable password Changeme2

Use a strong password base when setting the enable password. The enable password is a virtual terminal password that is used to protect access to the router over a network interface. This password is not stored encrypted on the CISCO 881 router, and can be seen when viewing the router configuration.

6.Set the enable secret password by using the command "enable secret." For example, use the password "Newpswd4."

Router(config)#enable secret Newpswd4

Use a different password for the enable secret password than for the enable password. The enable secret password is more secure and encrypted. Unlike the enable password, the enable secret password cannot be seen by viewing the CISCO router configuration.

2011年12月5日星期一

Cisco Catalyst 3560 v2 Series Switches, Most Popular in Cisco Catalyst 3560 Series


The Cisco Catalyst 3560 v2 Seriesis the next-generation energy-efficient Layer 3 fast Ethernet switches. This new series of switches supports Cisco EnergyWise technology, which enables companies to measure and manage power consumption of network infrastructure and network-attached devices, thereby reducing their energy costs and their carbon footprint.
Cisco3560 v2 Series switch consumes less power than its predecessors and is the ideal access layer switch for enterprise, retail, and branch-office environments, as it maximizes productivity and investment protection by enabling a unified network for data, voice, and video.
Key Features of cisco 3560g 12 puertos Series
• Lower power consumption than its predecessors
Backward compatible - uses the same Cisco IOS® Software image as the 3560 series and has the same feature set
Full EnergyWise support to monitor energy consumption of network infrastructure and implement energy saving programs to reduce energy costs
Compatible with Cisco Redundant Power System (RPS) 2300
All units have a uniform depth of 11.9 inches for better cable management
Preconfigurable with the Cisco IOS Software release at the time of ordering
IPv6 routing included in the IP Services feature set
• DC powered stand-alone model
About cisco 3560 switch price india Switch Configurations
3560V2-24TS (hot): 24 Ethernet 10/100 ports and 2 Small Form-Factor Pluggable (SFP)-based Gigabit Ethernet ports; 1 rack unit (RU)
3560V2-48TS (hot): 48 Ethernet 10/100 ports and 4 SFP-based Gigabit Ethernet ports; 1RU
3560V2-24PS (hot): 24 Ethernet 10/100 ports with PoE and 2 SFP-based Gigabit Ethernet ports; 1 RU
3560V2-48PS (hot): 48 Ethernet 10/100 ports with PoE and 4 SFP-based Gigabit Ethernet ports; 1RU
3560V2-24TS-SD: 24 Ethernet 10/100 ports and 2 SFP-based Gigabit Ethernet ports; 1RU, DC power supply
Price and Availability
Where to buy a cost-effective catalyst 3560 poe price? RouterSwitch.con is here, which can provide all items of Cisco 3560 switches at very competitive prices.
Contact details: Email: cisco@router-switch.com (Sales Inquiries)
 webmaster@router-switch.com (Technical Inquiries)
Tel:+852-3755-6766 (Hong Kong)
Fax: +852-3050-1066 (Hong Kong)
Address:7/F, Sino Centre, 582-592 Nathan Road, Mongkok Kowloon HongKong
Country:Hong Kong
Live Chat:Use the Live Chatonline our sales representatives.
Notes: Cisco Catalyst 3560-E Series Switches
Cisco Catalyst 3560-X Series Switches

2011年11月17日星期四

Cisco Catalyst 3560-E Series Switches

Cisco Catalyst 3560-E Series Switches are an enterprise-class line of standalone access and aggregation switches that facilitate the deployment of secure converged applications while maximizing investment protection for evolving network and application requirements. Configurations for the Cisco WS-C3560E-48PD-EF access switches include 24 and 48 ports of 10/100/1000 Ethernet with dual 10 Gigabit Ethernet ports. Power over Ethernet is available on both the 24-port and 48-port models and can deliver IEEE 802.3af 15.4W class 3 PoE on all ports simultaneously. Combining 10/100/1000 and PoE configurations with 10 Gigabit Ethernet uplinks, the Cisco WS-C3560E-48PD-SF enhances worker productivity by enabling applications such as IP telephony, wireless, and video.

The Cisco Catalyst 3560-E Series aggregation solutions - the Cisco Catalyst 3560E-12D, a 12-port 10 Gigabit Ethernet aggregation switch, and the Cisco Catalyst 3560E-12SD, a 12-port SFP Gigabit Ethernet aggregation switch with 2 10 Gigabit Ethernet uplink ports, deliver secure nonstop unified network services and versatile connectivity in a one-rack unit (1-RU) form factor for space- and power-constrained environments, enabling businesses to reduce total cost of ownership while maximizing investment protection.

Cisco WS-C3560E-48PD-S highlights:
• Cisco TwinGig converter module for migrating uplinks from Gigabit Ethernet to 10 Gigabit Ethernet
• PoE configurations with 15.4W of PoE on all 48 ports
• Industry first portfolio to scale beyond 15.4W per port delivering maximum solution simplicity for 802.11n access point deployments
• Access switch models have modular power supply with externally available backup
• Dual redundant modular power supplies and fans for Cisco Catalyst 3560E-12D and Cisco Catalyst 3560E-12SD aggregation switches for nonstop operation
• Multicast routing, IPv6 routing, and access control list (ACL) in hardware
• Out-of-band Ethernet management port along with RS-232 console port

Benefits of the WS-C3560E-24PD-S
Scale your network as your business grows: With the TwinGig converter module, you can convert the 10 Gigabit Ethernet interfaces into dual SFP ports in the access and aggregation layers, allowing you to migrate from Gigabit to 10 Gigabit Ethernet when your business demands change without changing network devices. The Cisco Catalyst 3560E-12D also enables the aggregation of up to 12 10 Gigabit Ethernet links within a compact 1-RU form factor in space-constrained environments. Decrease network costs over time: the Cisco Catalyst 3560-E delivers full PoE (15.4W) on every 10/100/1000 port so that as your needs for PoE and Gigabit Ethernet grow, you are positioned to support them without costly upgrades or complete network replacements.

2011年10月19日星期三

How to Configure a DHCP Cisco 1841?

Cisco 1841 is a highly capable router that provides the full feature set needed for small or remote office connectivity to the Internet or other private networks. Dynamic Host Configuration Protocol (DHCP) service is one of the features supported by the cisco 1841 router port and must be enabled if the router is expected to provide dynamic Internet Protocol (IP) addressing to hosts on the private network. The DHCP feature includes many options; however, you can set up a standard configuration in about 30 minutes.
Tips: DHCP service is one of many features that you can enable on a Cisco 1841 router.

Things you’ll use
Cisco serial console cable
  • Microsoft Windows XP computer with 9-pin serial port
  • Network IP number and subnet mask intended for the network
  • IP address for the network DNS server
  • IP address for the network default gateway
  • IP address of a local FTP server
  • Name of the directory where DHCP logs can be stored on the FTP server
  • Credentials of an account that has access to the FTP server

Instructions to Configure a DHCP cisco 1841 rear view Step by Step
Step1. Connect the Cisco serial console cable into the 9-pin serial port on the back of the computer and then connect the other end of the serial console cable into the serial console port on the router 1841.

Step2. Select the "Start" button on Windows XP and then select "All Programs" in the menu that appears. Then select "Accessories."

Step3.Choose the "Communications" program group and then select the "Hyperterminal" icon.

Step4. Enter " cisco 1841 pricing" in the window that appears and touch the "Enter" key. Then select the "Connect using:" menu and click the "Com" port that is connected to the Cisco 1841 from the list that displays. Click the "OK" button.

Step5.Select the "Bits per second" menu and then choose "9600" from the list that appears. Select the "Flow control:" menu and choose "None" in the list that appears. Select the "OK" button.

Step6. Tap the "Enter" key a few times and the Cisco CLI (Command Line Interface) will appear.

Step7.Enter "enable" on the command prompt and then press the "Enter" key. Type the "enable" password if requested and then tap the "Enter" key.

Step8. Type "config t" on the command prompt and then press the "Enter" key. Then type "service dhcp" and press the "Enter" key.

Step9. Type "ipdhcp database ftp://user:password@ip_address/dhcp_logs write-delay 120" except replace the "ip_address " with the FTP server IP address, the "user:password" with the account name and password for the FTP server, cisco 1841 router price list and "dhcp_logs" with the name of the directory where the DHCP logs will be stored on the FTP server. Press the "Enter" key.

Step10. Type "ipdhcp pool pool_name" except replace "pool_name" with a name for the DHCP address pool and then press the "Enter" key. Then type "network 10.0.0.0 255.0.0.0" except replace the "10.0.0.0 255.0.0.0" with the network IP number and subnet mask of the DHCP scope of addresses to be configured for the network.

Step11. Type "dns-server ip_address" except replace "ip_address" with the actual IP address of the DNS server for the network and then press the "Enter" key.

Step12. Type "default-router ip_address" except replace "ip_address" with the default gateway IP address for the network and then press the "Enter" key.

Step13. Type "end" at the command prompt and press the "Enter" key. Type "copy run start" and press the "Enter" key to save the configuration.

2011年9月30日星期五

Cisco 1800 Series, Business Router for Small to Medium Sized Business/Enterprise


Cisco 1800 Series Integrated Services Routers, the next evolution of the award-winning Cisco 1700 Series modular access routers, own more advantages than the formers. Cisco 1800 series, ideal for small to medium-sized businesses and small enterprise branch offices, cisco 1841 enable businesses to reduce costs by deploying a single, resilient system for fast, secure, delivery of multiple mission-critical business services, including data, security, unified communications, wireless.

Cisco 1800 series router has several models including 1801, 1802, 1803, 1811, 1812, 1841(most popular), 1861, all of them have some common features: a. Designed for small businesses or branch offices and to offer secure wireless networking; b. Multiple performance options based on local, remote, cisco 1800 series or broadband connections; c. Integrated security including encryption and protection against hackers; d. Virtual private networks for linking to partners, suppliers, and remote offices; e. Multiple options for adding reliability and option for reduced costs by using power from network cabling; f. Software upgrades to add new features and functions, and integrated switching capabilities.

Cisco 1800 series router has several models including 1801, 1802, 1803, 1811, 1812, 1841(most popular), 1861. You can check details of every type as follows:
The fixed platform models (1801, 1802, 1803, 1811, 1812) include multiple WAN interface options, plus:
  • Up to broadband speeds
  • Eight 10/100 Mbps built-in switch ports with optional Power over Ethernet (PoE), for providing DC power to network devices such as IP phones
  • Up to 50 VPN tunnels
  • Support for wireless local-area network (LAN) standards 802.11a/b/g

The 1841 is a modular platform with a wide range of interface options, plus:
  • Up to T1/E1speeds
  • Up to four 10/100 Mbps built-in switch ports
  • Up to 800 VPN tunnels cisco 1800 series router
  • Support for wireless local-area network (LAN) standards 802.11a/b/g

The 1861 is a modular platform built on a fixed base with a wide range of WAN interface options, plus: 
  • Integrated Cisco Unified Communications Manager Express or Cisco Unified Survivable Remote Site Telephony for call processing
  • Cisco Unity Express, for voice messaging and automated attendant
  • Integrated LAN switching with Power over Ethernet (PoE) expandable through Cisco Catalyst Switches
  • Onboard voice ports for PSTN, PBX, and key system connections

With Cisco 1800 Series integrated services routers; you can lay the foundation for future growth and prepare for voice, video, wireless, and security solutions tomorrow. 1800 series router

If you want to know more about e about the certain type of Cisco 1800 series, you can visit the list of Cisco 1800 router series, prices also offered.



Cisco 1800 Series Models Details…
1800 Series Model
Key Benefits
Type
of Connection
Numberof
VPN Users
1801
Provide secure access to the Internet and reduce costs by enabling deployment of a single device to provide multiple services typically performed by separate devices

Broadband over traditional phone lines


50
1802
Provide secure access to the Internet and reduce costs by enabling deployment of a single device to provide multiple services typically performed by separate devices

Broadband over ISDN lines


50
1803
Provide secure access to the Internet and reduce costs by enabling deployment of a single device to provide multiple services typically performed by separate devices


Broadband


50
1811
Provide secure access to the Internet and reduce costs by enabling deployment of a single device to provide multiple services typically performed by separate devices

Ethernet, Fast Ethernet


50
1812
Provide secure access to the Internet and reduce costs by enabling deployment of a single device to provide multiple services typically performed by separate devices
Ethernet, Fast Ethernet

50
Highly expandable for addition of other network capabilities
Broadband, Ethernet, Fast Ethernet

800
1861
Modular design allows for addition of other network capabilities
Ethernet, Fast Ethernet
Up to 8

2011年9月22日星期四

Cisco 3925 Router Password Recovery


The Cisco 3925 router is part of a family of networking equipment produced by Cisco, which has been a network equipment giant for many years. Used 3925 routers are available on the Internet at reasonable prices, so acquiring one is not difficult. However, if the password is unknown or lost, reconfiguration is impossible until the password is reset or recovered. Cisco has built in a procedure for rescuing lost or forgotten passwords or entering new passwords.

Things You'll Need: Serial to RJ-45 cable; Terminal emulation software

Instructions
1. Connect your computer to the router with the blue serial-to-RJ-45 cable that came with the router. The 9-pin D-shell end connects to your computer's serial port, while the RJ-45 end connects to the console jack on the router. The RJ-45 end resembles a slightly larger telephone jack connector.

2. Turn on your computer and establish a terminal session to the cisco 3825. You can use any terminal emulator, and many are freely available on the Internet. Configure the session settings as follows:
9600 baud
8 data bits
No parity
1 stop bit
No flow control

Plug the router's power cable into an electrical outlet, and as the cisco 3945 boots, you should see the Cisco boot messages. If you don't see any output on your computer's terminal session, check your settings on the session and restart it if necessary. Press "Break" within 30 seconds of powering on the router to enter rommon (rom monitor) mode.

3. Type "confreg 0x2142" and press "Enter" at the "rommon 1" prompt. This will cause the router to boot from its internal flash memory without loading the configuration into memory. At the following "rommon 2" prompt, router cisco type "reset" and press "Enter." This will cause the router to reload and ignore the previously saved configuration file.

4. Respond "no" and press "Enter" when prompted for responses to enter the initial dialog or basic management setup. Type "enable" and press "Enter" at the following "Router>" prompt. This will put you into enable mode and display the "Router#" prompts. Copy the non-volatile memory into memory with the "copy startup-config running-config" command, followed by the "Enter" key. buy cisco router Type "sho run" at the prompt and press "Enter" to display the current configuration, including the passwords, some of which may be encrypted.

5. Type "config t" at the prompt and press "Enter." At the "Router(config)#" prompt, type "enable secret <pswd>" -- where "pswd" is the password -- and press "Enter." At this point, your enable password is reset. Press "Ctrl" + "z" to return to the "Router#" prompt.

6. Type "config t" at the "Router#" prompts and presses "Enter." At the "Router(config)#" prompt, type "config-register 0x02102" and press "Enter" to reset the boot register to its normal setting. buy cisco routers Press "Ctrl" + "z" to leave configuration mode. Type "copy running-config startup-config" and press "Enter" to save your changes. Reboot the router and you should be able to login with your password.